skip to main content
10.1145/3366626.3368128acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

Designing for Privacy and Confidentiality on Distributed Ledgers for Enterprise (Industry Track)

Published:09 December 2019Publication History

ABSTRACT

Distributed ledger technology offers numerous desirable attributes to applications in the enterprise context. However, with distributed data and decentralized computation on a shared platform, privacy and confidentiality challenges arise. Any design for an enterprise system needs to carefully cater for use case specific privacy and confidentiality needs. With the goal to facilitate the design of enterprise solutions, this paper aims to provide a guide to navigate and aid in decisions around common requirements and mechanisms that prevent the leakage of private and confidential information. To further contextualize key concepts, the design guide is then applied to three enterprise DLT protocols: Hyperledger Fabric, Corda, and Quorum.

References

  1. Shawn Amundson. 2019. Hyperledger Proposal for Transaction Execution Platform. https://wiki.hyperledger.org/display/HYP/ Hyperledger+Proposal+for+Transaction+Execution+PlatformGoogle ScholarGoogle Scholar
  2. Ittai Anati, Shay Gueron, Simon P Johnson, and Vincent R Scarlata. 2013. Innovative Technology for CPU Based Attestation and Sealing. (2013), 1--7.Google ScholarGoogle Scholar
  3. Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. (2018). https://doi.org/10.1145/3190508.3190538 arXiv:1801.10228Google ScholarGoogle Scholar
  4. Elli Androulaki, Christian Cachin, Angelo De Caro, and Eleftherios Kokoris-Kogias. 2018. Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. Springer, Cham, 111--131. https://doi.org/10.1007/978-3-319-99073-6_6Google ScholarGoogle Scholar
  5. Arati Baliga, I Subhod, Pandurang Kamat, and Siddhartha Chatterjee. 2018. Performance Evaluation of the Quorum Blockchain Platform. (2018). arXiv:1809.03421 http://arxiv.org/abs/1809.03421Google ScholarGoogle Scholar
  6. Marcus Brandenburger, Christian Cachin, Matthias Lorenz, and Rudiger Kapitza. 2017. Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory. Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017 (2017), 157--168. https://doi.org/10.1109/DSN. 2017.45 arXiv:arXiv:1701.00981v2Google ScholarGoogle ScholarCross RefCross Ref
  7. Vitalik Buterin. 2014. A next-generation smart contract and decentralized application platform., 36 pages. http://buyxpr.com/build/pdfs/EthereumWhitePaper.pdfGoogle ScholarGoogle Scholar
  8. Jan Camenisch and Els Van Herreweghen. 2004. Design and implementation of the idemix anonymous credential system. (2004), 21. https://doi.org/10.1145/586110.586114Google ScholarGoogle Scholar
  9. David Chaum, Claude Crepeau, and Ivan Damgard. 1988. Multiparty Unconditionally Secure Protocols. In Proceedings of the twentieth annual ACM symposium on Theory of computing. ACM, Chicago, Illinois, USA, 11--19. http://crypto.cs.mcgill.ca/{~}crepeau/PDF/ASPUBLISHED/CCD88A.pdfGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  10. European Court of Justice. 2014. EUR-Lex - 62012CJ0131 - EN - EUR-Lex. Technical Report. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX{%}3A62012CJ0131Google ScholarGoogle Scholar
  11. Christopher Ferris. 2019. Does Hyperledger Fabric perform at scale? -Blockchain Pulse: IBM Blockchain Blog. https://www.ibm.com/blogs/blockchain/2019/04/does-hyperledger-fabric-perform-at-scale/Google ScholarGoogle Scholar
  12. Craig Gentry. 2010. Computing arbitrary functions of encrypted data. Commun. ACM 53, 3 (2010), 97. https://doi.org/10.1145/1666420.1666444Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1989. The Knowledge Complexity of Interactive Proof Systems. Technical Report 1. 186--208 pages. http://crypto.cs.mcgill.ca/{~}crepeau/COMP647/2007/TOPIC01/GMR89.pdfGoogle ScholarGoogle Scholar
  14. Mike Hearn. 2016. Corda: A distributed ledger. Technical Report.Google ScholarGoogle Scholar
  15. JP Morgan Chase. 2016. Quorum Whitepaper. Technical Report. JP Morgan Chase. https://github.com/jpmorganchase/quorum-docs/ blob/master/QuorumWhitepaperv0.1.pdfGoogle ScholarGoogle Scholar
  16. Kristin Lauter, Michael Naehrig, and Vinod Vaikuntanathan. 2011. Can homomorphic encryption be practical? Proceedings of the ACM Conference on Computer and Communications Security (2011), 113--124. https://doi.org/10.1145/2046660.2046682Google ScholarGoogle Scholar
  17. R3 Limited. 2019. SGX Integration. https://docs.corda.net/head/design/sgx-integration/design.htmlGoogle ScholarGoogle Scholar
  18. Linux Foundation. 2018. [FAB-106] ledger checkpoint and pruning/archiving - Hyperledger JIRA. https://jira.hyperledger.org/browse/FAB-106Google ScholarGoogle Scholar
  19. Ralph C Merkle. 1982. Method of Providing Digital Signatures., 5 pages. https://patentimages.storage.googleapis.com/69/ab/d9/2ff9f94fada6ea/US4309569.pdfGoogle ScholarGoogle Scholar
  20. Eduardo Morais, Tommy Koens, Cees Van Wijk, and Aleksei Koren. 2018. A Survey on Zero Knowledge Range Proofs and Applications. Technical Report. 1--33 pages. arXiv:1907.06381v1 https://arxiv.org/pdf/1907.06381.pdfGoogle ScholarGoogle Scholar
  21. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Technical Report. www.bitcoin.orgGoogle ScholarGoogle Scholar
  22. NIST. 2001. Announcing the ADVANCED ENCRYPTION STANDARD (AES). US Department of Commerce, National Institute of Standards and Technology 56 (2001), 57--71. https://doi.org/10.6028/NIST.FIPS.197Google ScholarGoogle Scholar
  23. Ronald L Rivest, Adi Shamir, and Leonard Adleman. 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 21, 2 (1978), 120--126.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Designing for Privacy and Confidentiality on Distributed Ledgers for Enterprise (Industry Track)

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      Middleware '19: Proceedings of the 20th International Middleware Conference Industrial Track
      December 2019
      62 pages
      ISBN:9781450370417
      DOI:10.1145/3366626

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 December 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate203of948submissions,21%
    • Article Metrics

      • Downloads (Last 12 months)17
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader